{"id":3654,"date":"2023-09-26T15:19:51","date_gmt":"2023-09-26T12:19:51","guid":{"rendered":"https:\/\/uzmanposta.com\/blog\/?p=3654"},"modified":"2023-09-26T15:24:17","modified_gmt":"2023-09-26T12:24:17","slug":"trojan","status":"publish","type":"post","link":"https:\/\/uzmanposta.com\/blog\/trojan\/","title":{"rendered":"Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri"},"content":{"rendered":"\n<p>Trojan vir\u00fcsleri en yayg\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcrleri aras\u0131ndad\u0131r. Ki\u015fisel bilgilerinizi \u00e7almak, dosyalar\u0131n\u0131z\u0131 silmek ve bilgisayar\u0131n\u0131z\u0131 ele ge\u00e7irmek i\u00e7in tasarlanm\u0131\u015flard\u0131r. Ayr\u0131ca bir trojan vir\u00fcs\u00fc, bir bilgisayar korsan\u0131n\u0131n makinenize uzaktan eri\u015fmesini sa\u011flayarak sizi g\u00f6zetlemesini ve hatta kimli\u011finizi \u00e7almas\u0131n\u0131 da m\u00fcmk\u00fcn k\u0131labilir.&nbsp;<\/p>\n\n\n\n<p>E\u011fer cihaz\u0131n\u0131zda trojan vir\u00fcs\u00fcn\u00fcz oldu\u011funu d\u00fc\u015f\u00fcn\u00fcyor, ancak bu vir\u00fcs\u00fc kendi ba\u015f\u0131n\u0131za nas\u0131l kald\u0131raca\u011f\u0131n\u0131z\u0131 bilmiyorsan\u0131z, bu yaz\u0131m\u0131zda trojan vir\u00fcs\u00fc ile ilgili t\u00fcm detaylar\u0131 anlataca\u011f\u0131z.<\/p>\n\n\n\n<p>Haydi ba\u015flayal\u0131m!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trojan Nedir?<\/h2>\n\n\n\n<p>Truva at\u0131 yani trojan, yasal bir uygulama veya dosya gibi gizlenmi\u015f k\u00f6t\u00fc ama\u00e7l\u0131 bir programd\u0131r. Teknik olarak vir\u00fcs olmamas\u0131na ra\u011fmen, Truva atlar\u0131 hala yayg\u0131n olarak bu \u015fekilde an\u0131l\u0131r. Asl\u0131nda g\u00fcn\u00fcm\u00fczde vir\u00fcs veya k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m birbirinin yerine an\u0131ld\u0131\u011f\u0131 i\u00e7in bir ayr\u0131m yap\u0131lmasa da, aradaki fark\u0131 bilmek \u00f6nemlidir.<\/p>\n\n\n\n<p>Bir Truva at\u0131 vir\u00fcsler gibi kendini \u00e7o\u011faltmaz; bunun yerine kullan\u0131c\u0131 taraf\u0131ndan y\u00fcklenmesi gerekir. Bir Trojan&#8217;\u0131n ana amac\u0131, bir kullan\u0131c\u0131n\u0131n oturum a\u00e7ma bilgileri ve kredi kart\u0131 numaralar\u0131 gibi verilerine m\u00fcdahale etmek veya bazen do\u011frudan bu bilgileri \u00e7almaya \u00e7al\u0131\u015fmakt\u0131r.<\/p>\n\n\n\n<p>Truva atlar\u0131 genellikle cihaz\u0131n\u0131za ba\u015fka k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n da indirilmesini sa\u011flar. \u0130ndirilen bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan koruma yaz\u0131l\u0131m\u0131n\u0131z\u0131 devre d\u0131\u015f\u0131 b\u0131rakarak t\u00fcm sisteminizi bozmay\u0131 kolayla\u015ft\u0131rabilir.&nbsp;<\/p>\n\n\n\n<p>Bilgisayar\u0131n\u0131zda Trojan olup olmad\u0131\u011f\u0131n\u0131 anlaman\u0131n iki ana yolu vard\u0131r. Birincisi, tan\u0131mad\u0131\u011f\u0131n\u0131z \u015f\u00fcpheli g\u00f6r\u00fcn\u00fcml\u00fc dosyalar veya programlar aramakt\u0131r. \u0130kincisi ise bir antivir\u00fcs program\u0131 kullanarak k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m taramas\u0131 yapmakt\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Truva Atlar\u0131 \u0130\u015fletmenize Ne Kadar Zarar Verebilir?<\/h2>\n\n\n\n<p>Zarar, bilgisayar korsan\u0131n\u0131n Truva At\u0131&#8217;n\u0131 nas\u0131l olu\u015fturdu\u011funa g\u00f6re belirlenir. Ancak genel olarak, Trojan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 a\u015fa\u011f\u0131dakileri yapabilir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Verilerinizi kopyalayabilir.<\/li><li>Dosyalar\u0131n\u0131z\u0131 silebilir.<\/li><li>Cihaz\u0131n\u0131zdaki verileri de\u011fi\u015ftirebilir.<\/li><li>Daha fazla k\u00f6t\u00fc yaz\u0131l\u0131m y\u00fcklenmesine neden olabilir.<\/li><li>\u00d6zel bilgilerinizi \u00e7alar.<\/li><li>Cihaz\u0131n\u0131z\u0131n \u00e7al\u0131\u015fma \u015feklini bozar.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Truva Atlar\u0131 Y\u00fcklendikten Sonra Ger\u00e7ekte Ne Yapar?<\/h2>\n\n\n\n<p>A\u015fa\u011f\u0131da, Truva atlar\u0131n\u0131n bir bilgisayar sistemine y\u00fcklendikten sonra ger\u00e7ekle\u015ftirebilece\u011fi en yayg\u0131n sald\u0131r\u0131lardan baz\u0131lar\u0131 yer almaktad\u0131r:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Arka kap\u0131 olu\u015fturma<\/h3>\n\n\n\n<p>Bir Trojan bilgisayar\u0131n\u0131za bula\u015ft\u0131\u011f\u0131nda, bilgisayar korsan\u0131n\u0131n cihaz\u0131n\u0131za eri\u015fmesi i\u00e7in yetkisiz bir eri\u015fim noktas\u0131 olu\u015fturabilir. Truva at\u0131n\u0131n kendisi de bilgisayar korsan\u0131 taraf\u0131ndan kontrol edilen bir sunucuya bilgi g\u00f6nderebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Bilgilerinizi \u00e7almak<\/h3>\n\n\n\n<p>Bir\u00e7ok Truva at\u0131 ki\u015fisel ve finansal bilgilerinizi ele ge\u00e7irmek ve y\u00f6nlendirmek i\u00e7in tasarlan\u0131r ve bir arka kap\u0131 ile birlikte \u00e7al\u0131\u015f\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Daha fazla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve vir\u00fcs indirme<\/h3>\n\n\n\n<p>Baz\u0131 Truva atlar\u0131 zaten vir\u00fcs bula\u015fm\u0131\u015f bilgisayar\u0131 hedef al\u0131r ve daha fazla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve vir\u00fcs indirmenizi sa\u011flar.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Bilgisayar\u0131n\u0131z\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irme<\/h3>\n\n\n\n<p>Di\u011fer Truva atlar\u0131 bilgisayar\u0131n\u0131zda ne oldu\u011fuyla pek ilgilenmez, bilgisayar\u0131n\u0131z\u0131 kontrol sa\u011flad\u0131\u011f\u0131 bir a\u011fda bot olarak kullanmay\u0131 tercih eder. Bu genellikle Da\u011f\u0131t\u0131lm\u0131\u015f Hizmet Engelleme sald\u0131r\u0131lar\u0131 (DDoS) ger\u00e7ekle\u015ftirmek i\u00e7in yap\u0131l\u0131r. Bir DDoS sald\u0131r\u0131s\u0131nda, bilgisayar korsanlar\u0131 sizin cihaz\u0131n\u0131z\u0131 (ve muhtemelen di\u011fer ki\u015filerin cihazlar\u0131n\u0131) kullanarak bir sunucuyu kendi kontrolleri alt\u0131ndaki makinelerden gelen trafikle doldurarak \u00e7evrimd\u0131\u015f\u0131 hale getirir. Bir di\u011fer yayg\u0131n kullan\u0131m ise bilgisayar korsanlar\u0131n\u0131n makinenizi kullanarak kendileri i\u00e7in bitcoin madencili\u011fi yapt\u0131\u011f\u0131 cryptojacking&#8217;dir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. \u00dccretli mesajlar g\u00f6nderme<\/h3>\n\n\n\n<p>Baz\u0131 Truva atlar\u0131 ak\u0131ll\u0131 telefonlara da bula\u015fabilir ve cihaza girdikten sonra \u00fccretli numaralara SMS mesajlar\u0131 g\u00f6ndermeye ba\u015flayarak faturan\u0131z\u0131n artmas\u0131na neden olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Fidye yaz\u0131l\u0131m\u0131 truva atlar\u0131<\/h3>\n\n\n\n<p>Baz\u0131 Truva atlar\u0131 asl\u0131nda fidye yaz\u0131l\u0131m\u0131d\u0131r, yani fidye yaz\u0131l\u0131m\u0131na a\u00e7\u0131lan bir kap\u0131d\u0131r. Fidye yaz\u0131l\u0131mlar\u0131 sisteminize y\u00fcklendikten sonra genellikle dosyalar\u0131n\u0131z\u0131 bilinmeyen bir anahtar veya parola ile \u015fifreler ve ard\u0131ndan \u015fifre \u00e7\u00f6zme parolas\u0131 veya anahtar\u0131 kar\u015f\u0131l\u0131\u011f\u0131nda bir fidye (genellikle para) talep eder.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trojanlar Nas\u0131l \u00c7al\u0131\u015f\u0131r?&nbsp;<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"800\" height=\"480\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojanlar-nasil-calisir.jpeg\" alt=\"Trojanlar Nas\u0131l \u00c7al\u0131\u015f\u0131r?\u00a0\" class=\"wp-image-3674\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojanlar-nasil-calisir.jpeg 800w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojanlar-nasil-calisir-300x180.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojanlar-nasil-calisir-768x461.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojanlar-nasil-calisir-750x450.jpeg 750w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption>Kaynak: thetechedvocate<\/figcaption><\/figure><\/div>\n\n\n\n<p>Truva atlar\u0131, kullan\u0131c\u0131lar\u0131 kand\u0131r\u0131p, onlar\u0131 bir \u015feyler indirip y\u00fcklemeye ikna ettikten sonra sisteme bula\u015f\u0131r. \u00dccretsiz oyunlar, m\u00fczik dosyalar\u0131 veya di\u011fer programlar gibi \u015fekillerde gizlenebilir. Truva at\u0131 vir\u00fcs\u00fc bula\u015fmas\u0131n\u0131n yayg\u0131n \u00f6rneklerinden biri, a\u00e7\u0131ld\u0131\u011f\u0131nda bilgisayara yay\u0131lan vir\u00fcsl\u00fc ekler i\u00e7eren kimlik av\u0131 e-posta\u2019lar\u0131d\u0131r. Bu, bilgisayar korsanlar\u0131 taraf\u0131ndan kullan\u0131c\u0131lar\u0131 bilgisayarlar\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m indirmeleri i\u00e7in kand\u0131rmak amac\u0131yla kullan\u0131lan sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131n\u0131n yaln\u0131zca bir t\u00fcr\u00fcd\u00fcr.&nbsp;<\/p>\n\n\n\n<p>Bir Trojan vir\u00fcs\u00fcn\u00fcn neden olabilece\u011fi bir dizi zararl\u0131 etki vard\u0131r. Bunlardan baz\u0131lar\u0131 kolayca d\u00fczeltilebilirken, di\u011ferleri bir profesyonelin i\u015fe al\u0131nmas\u0131n\u0131 ve hatta yetkililerin dahil edilmesini gerektirebilir.&nbsp;<\/p>\n\n\n\n<p>\u00c7\u00fcnk\u00fc cihaz\u0131n\u0131z siber su\u00e7lar i\u00e7in kullan\u0131labilir. Bazen siber su\u00e7lular sadece hassas verilerinizi \u00e7almakla kalmazlar. Cihaz\u0131n\u0131z\u0131n bir Trojan ile tehlikeye at\u0131labilece\u011fi ve daha sonra ba\u015fka bir siber sald\u0131r\u0131 i\u00e7in silah olarak kullan\u0131labilece\u011fi durumlar vard\u0131r.&nbsp;<\/p>\n\n\n\n<p>B\u00f6yle bir senaryoda, cihaz\u0131n\u0131z bir DDoS sald\u0131r\u0131s\u0131nda yer alan bir u\u00e7 nokta olarak kullan\u0131labilir. Bu durum sizi kesinlikle endi\u015felendirmelidir, \u00e7\u00fcnk\u00fc bilgisayar\u0131n\u0131z\u0131n ele ge\u00e7irilmesinin yan\u0131 s\u0131ra IP adresiniz de siber su\u00e7 faaliyetleriyle ili\u015fkilendirilebilir.&nbsp;<\/p>\n\n\n\n<p><strong>Hassas bilgilerin \u00e7al\u0131nmas\u0131:<\/strong> Bu, Trojan vir\u00fcslerinin \u00e7ok daha yayg\u0131n bir kullan\u0131m\u0131d\u0131r. Bilgisayar\u0131n\u0131za yerle\u015ftirildikten sonra \u015fifreleriniz ve hesap bilgileriniz \u00e7al\u0131nabilir ve \u00fc\u00e7\u00fcnc\u00fc bir tarafa aktar\u0131labilir.&nbsp;<\/p>\n\n\n\n<p><strong>Gelecekteki tehditlere izin veren de\u011fi\u015ftirilmi\u015f ayarlar:<\/strong> Truva atlar\u0131, g\u00fcvenlik sistemini de\u011fi\u015ftirerek ve kullan\u0131c\u0131 fark\u0131na varmadan daha fazla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n sisteme girmesine izin vererek kullan\u0131c\u0131lar\u0131n bilgisayarlar\u0131nda arka kap\u0131lar olu\u015fturmalar\u0131yla bilinir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trojan T\u00fcrleri<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-turleri.jpeg\" alt=\"\" class=\"wp-image-3676\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-turleri.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-turleri-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-turleri-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-turleri-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-turleri-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>En yayg\u0131n Truva at\u0131 t\u00fcrlerinden baz\u0131lar\u0131 a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Arka Kap\u0131 Truva At\u0131<\/h3>\n\n\n\n<p>Bu Truva at\u0131 vir\u00fcsleri kullan\u0131c\u0131n\u0131n bilgisayar\u0131nda bir &#8220;arka kap\u0131&#8221; olu\u015fturarak bilgisayar korsan\u0131n\u0131n cihaz\u0131n\u0131z\u0131 kontrol etmesine, \u00e7al\u0131nan verileri y\u00fcklemesine ve hatta bilgisayar\u0131n\u0131za daha fazla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m indirmesine olanak tan\u0131yabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. \u0130ndirici Truva At\u0131<\/h3>\n\n\n\n<p>Bu Truva at\u0131 vir\u00fcslerinin temel amac\u0131, vir\u00fcs bula\u015fm\u0131\u015f bilgisayara daha fazla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m indirmenizi sa\u011flamakt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Infostealer Truva At\u0131<\/h3>\n\n\n\n<p>Bu Truva at\u0131 vir\u00fcs\u00fcn\u00fcn ana hedefi, bula\u015ft\u0131\u011f\u0131 bilgisayardan veri \u00e7almakt\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Uzaktan Eri\u015fim Truva At\u0131<\/h3>\n\n\n\n<p>Bu Truva at\u0131 vir\u00fcs\u00fc, bilgisayar korsan\u0131na bilgisayar \u00fczerinde tam kontrol sa\u011flamak i\u00e7in tasarlanm\u0131\u015ft\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Da\u011f\u0131t\u0131lm\u0131\u015f Hizmet Reddi (DDoS) Sald\u0131r\u0131s\u0131 Truva At\u0131<\/h3>\n\n\n\n<p>Bu Truva at\u0131 vir\u00fcs\u00fc, bir a\u011f\u0131 trafi\u011fe bo\u011farak \u00e7\u00f6kertmek i\u00e7in tasarlanm\u0131\u015f DDoS sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Truva At\u0131n\u0131n Cihaz\u0131n\u0131z\u0131n \u00dczerindeki Etkisi Nedir?<\/h2>\n\n\n\n<p>Bilgisayar\u0131n\u0131za bula\u015ft\u0131ktan sonra Trojan istedi\u011fi her \u015feyi yapabilir. Dosyalar\u0131n\u0131z\u0131 bozabilir veya silebilir ya da bilgisayar\u0131n\u0131z\u0131 bir botnet a\u011f\u0131n\u0131n par\u00e7as\u0131 olarak kullanabilir. Web kameran\u0131z\u0131 a\u00e7abilir ve siz internette gezinirken sizi kaydedebilir. Yani tek amac\u0131 zarar ve hasara neden olmakt\u0131r.<\/p>\n\n\n\n<p>Truva At\u0131 vir\u00fcs\u00fcn\u00fcn neden olabilece\u011fi di\u011fer etkiler ise a\u015fa\u011f\u0131daki \u015fekildedir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Kredi kart\u0131 bilgileri, banka hesap bilgileri, \u015fifreler ve di\u011fer hassas bilgiler gibi ki\u015fisel bilgilerinizi \u00e7alabilir. Ayr\u0131ca e-posta adresinizden ki\u015fi listenizdeki herkese e-posta g\u00f6nderebilir.<\/li><li>Solucanlar, keyloggerlar, rootkitler gibi di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 programlar\u0131 bilgisayar\u0131n\u0131za indirebilir ve y\u00fckleyebilir. Bu programlar bilgisayar\u0131n\u0131zdan bilgi \u00e7alabilir veya di\u011fer yasa d\u0131\u015f\u0131 faaliyetler i\u00e7in kullanabilir.<\/li><li>Pornografi indirebilir ve siz fark\u0131nda olmadan ekran\u0131n\u0131zda g\u00f6r\u00fcnt\u00fcleyebilir. Ayr\u0131ca sizin haberiniz olmadan bilgisayar\u0131n\u0131zdan rastgele numaralara m\u00fcstehcen telefon aramalar\u0131 yapabilir.<\/li><li>Bilgisayar\u0131n\u0131z\u0131 spam e-posta\u2019lar g\u00f6ndermek veya di\u011fer bilgisayarlara hizmet reddi sald\u0131r\u0131lar\u0131 ba\u015flatmak i\u00e7in kullanabilir. Ayr\u0131ca yasad\u0131\u015f\u0131 web sitelerini bar\u0131nd\u0131rabilir ve di\u011fer yasad\u0131\u015f\u0131 i\u00e7erikleri indirebilir.<\/li><li>Sizin haberiniz olmadan ana sayfan\u0131z\u0131, varsay\u0131lan arama motorunuzu ve yeni sekme sayfan\u0131z\u0131 de\u011fi\u015ftirebilir.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Bilgisayar\u0131n\u0131z\u0131 Trojanlara Kar\u015f\u0131 Nas\u0131l Korursunuz?<\/h2>\n\n\n\n<p>A\u015fa\u011f\u0131daki listede bilgisayar\u0131n\u0131z\u0131 Truva atlar\u0131na kar\u015f\u0131 koruman\u0131z i\u00e7in gerekli olabilecek \u00f6nemli ipu\u00e7lar\u0131n\u0131 bulabilirsiniz:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. E-posta Eklerine Dikkat Edin<\/h3>\n\n\n\n<p>E-posta ne kadar ger\u00e7ek g\u00f6r\u00fcn\u00fcrse g\u00f6r\u00fcns\u00fcn ya da kim g\u00f6ndermi\u015f olursa olsun, her zaman dikkatlice kontrol etmeniz gerekir. Arkada\u015f\u0131n\u0131z\u0131n bilgisayar\u0131na vir\u00fcs bula\u015fm\u0131\u015fsa, muhtemelen size veya e-posta ileti\u015fim listesindeki ba\u015fka birine k\u00f6t\u00fc ama\u00e7l\u0131 bir ek g\u00f6nderilmi\u015f olabilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. G\u00fcvenilir Kaynaklardan Gelen Programlar<\/h3>\n\n\n\n<p>G\u00fcvenilir kaynaklardan gelen programlar\u0131 kullanmak, bir Truva at\u0131n\u0131n bir cihaza girme olas\u0131l\u0131\u011f\u0131n\u0131 azalt\u0131r. Bu nedenle, herhangi bir program\u0131 indirmeden \u00f6nce sat\u0131c\u0131ya dan\u0131\u015fman\u0131z gerekir. Ayr\u0131ca, yaz\u0131l\u0131m\u0131n do\u011frudan web sitesinden indirildi\u011finden emin olman\u0131z \u015fartt\u0131r. Baz\u0131 teklifler \u00f6nce &#8220;indirici&#8221; olarak adland\u0131r\u0131lan yaz\u0131l\u0131mlar\u0131 indirmenizi gerektirir. Ancak bunlar k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m i\u00e7erebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Anti-Vir\u00fcs Yaz\u0131l\u0131m\u0131 Y\u00fckleyin<\/h3>\n\n\n\n<p>Bir sisteme zarar verebilecek k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar antivir\u00fcs yaz\u0131l\u0131m\u0131 taraf\u0131ndan durdurulabilir. Bu yaz\u0131l\u0131mlar, Truva at\u0131n\u0131 bulmak ve ondan kurtulmak i\u00e7in bilgisayar\u0131 tarar. Ayr\u0131ca yeni vir\u00fcslere kar\u015f\u0131 koruma sa\u011flamak i\u00e7in otomatik olarak g\u00fcncellenir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. D\u00fczenli Veri Yedekleme<\/h3>\n\n\n\n<p>Bir \u015feylerin ters gitmesi durumunda kritik veri ve bilgileri g\u00fcvende tutmak i\u00e7in d\u00fczenli yedeklemeler yapman\u0131z gerekir. Bu, hasar\u0131 azaltmaya ve bilgisayar korsanlar\u0131n\u0131n bir \u015feyler talep etmesini engellemeye yard\u0131mc\u0131 olur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. D\u00fczenli Yaz\u0131l\u0131m G\u00fcncellemeleri<\/h3>\n\n\n\n<p>Antivir\u00fcs yaz\u0131l\u0131m\u0131n\u0131z\u0131 y\u00fcklemek kadar g\u00fcncel tutmak da \u00e7ok \u00f6nemlidir. Bu, bilgisayar korsanlar\u0131n\u0131n cihazlar\u0131n\u0131za girmesini engeller.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. \u015e\u00fcpheli Ba\u011flant\u0131lar\u0131 Atlay\u0131n<\/h3>\n\n\n\n<p>Bilgisayar korsanlar\u0131, insanlar\u0131n e-postalar\u0131 a\u00e7mas\u0131n\u0131 veya ger\u00e7ek bir \u015firketten ya da kaynaktan gelmi\u015f gibi g\u00f6r\u00fcnen ba\u011flant\u0131lara t\u0131klamas\u0131n\u0131 sa\u011flamaya \u00e7al\u0131\u015f\u0131r. Ba\u011flant\u0131, kullan\u0131c\u0131lar\u0131 ki\u015fisel bilgilerinin istendi\u011fi veya bir \u015fey indirebilecekleri sahte bir web sitesine g\u00f6t\u00fcrebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7. G\u00fcvenlik Duvar\u0131 Kurulumu<\/h3>\n\n\n\n<p>Bir sisteme zarar verebilecek k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, antivir\u00fcs yaz\u0131l\u0131m\u0131 taraf\u0131ndan durdurulabilir, truva at\u0131n\u0131 bulmak ve ondan kurtulmak i\u00e7in bilgisayar\u0131 tarar. Ayr\u0131ca yeni vir\u00fcslere kar\u015f\u0131 koruma sa\u011flamak i\u00e7in otomatik olarak g\u00fcncellenir.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Truva At\u0131 K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m \u00d6rnekleri<\/h2>\n\n\n\n<p>A\u015fa\u011f\u0131da yayg\u0131n olarak da\u011f\u0131t\u0131lan baz\u0131 \u00f6nemli Truva At\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00f6rneklerinin bir listesini bulabilirsiniz:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. AIDS Trojan<\/h3>\n\n\n\n<p>1989&#8217;un sonlar\u0131nda, AIDS Trojan i\u00e7eren binlerce disket PC Business World dergisi abonelerine ve WHO AIDS konferans\u0131 e-posta listesine postaland\u0131. Trojan y\u00fcklendikten sonra sistemdeki t\u00fcm dosya adlar\u0131n\u0131 \u015fifrelendi ve \u015fifre \u00e7\u00f6zme program\u0131 i\u00e7in 189 dolarl\u0131k bir fidye talebinde bulunuldu. Bu bilinen ilk fidye yaz\u0131l\u0131m\u0131yd\u0131.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Beast<\/h3>\n\n\n\n<p>2002 y\u0131l\u0131nda, Windows tabanl\u0131 arka kap\u0131 Truva at\u0131 Beast, o d\u00f6nemde neredeyse t\u00fcm Windows s\u00fcr\u00fcmlerine bula\u015fabiliyordu.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Vundo<\/h3>\n\n\n\n<p>2004 y\u0131l\u0131nda, sahte anti casus yaz\u0131l\u0131m programlar\u0131 i\u00e7in a\u00e7\u0131l\u0131r pencereler ve reklamlar \u00fcretti\u011fi bilinen Vundo Truva At\u0131 ilk kez ortaya \u00e7\u0131kt\u0131. Trojan ayr\u0131ca bula\u015ft\u0131\u011f\u0131 sistemde performans d\u00fc\u015f\u00fc\u015flerine neden oldu ve belirli web sitelerine eri\u015fimi engelleyebildi.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Zlob<\/h3>\n\n\n\n<p>Zlob Truva At\u0131 ilk kez 2005 y\u0131l\u0131nda farkedildi. Zlob Trojan, ger\u00e7ek Windows uyar\u0131 mesajlar\u0131n\u0131 taklit eden a\u00e7\u0131l\u0131r pencere uyar\u0131lar\u0131n\u0131n s\u0131k s\u0131k g\u00f6r\u00fcnmesine neden oluyordu. A\u00e7\u0131l\u0131r pencerelere t\u0131klamak, ek vir\u00fcsler ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar i\u00e7eren sahte bir antivir\u00fcs program\u0131n\u0131n indirilmesini tetikliyordu.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Tiny Banker<\/h3>\n\n\n\n<p>2016 y\u0131l\u0131nda Tiny Banker Trojan, cihazlara bula\u015fmaya ba\u015flad\u0131. Bu Truva At\u0131, orijinal, yasal bankac\u0131l\u0131k sitesine t\u0131pat\u0131p benzeyen sahte bir \u00e7evrimi\u00e7i bankac\u0131l\u0131k sayfas\u0131 g\u00f6r\u00fcnt\u00fclemek i\u00e7in HTTP enjeksiyonunu kulland\u0131. Kullan\u0131c\u0131 kimlik bilgilerini girdi\u011finde, bir hata oldu\u011funu belirten bir hata mesaj\u0131 g\u00f6r\u00fcnt\u00fclendi ve ard\u0131ndan kullan\u0131c\u0131 ger\u00e7ek bankac\u0131l\u0131k web sitesine y\u00f6nlendiriliyordu. Ancak bu noktada art\u0131k \u00e7ok ge\u00e7ti. Sahte sayfaya girilen kimlik bilgileri bilgisayar korsan\u0131 taraf\u0131ndan toplanm\u0131\u015ft\u0131. Kullan\u0131c\u0131 kimlik bilgilerinin \u00e7al\u0131nd\u0131\u011f\u0131n\u0131 bilmiyordu, \u00e7\u00fcnk\u00fc k\u00fc\u00e7\u00fck bir &#8220;aksakl\u0131ktan&#8221; sonra normal bir \u015fekilde giri\u015f yapabiliyordu.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trojan Vir\u00fcs\u00fc Nas\u0131l Temizlenir?<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-virusu-nasil-temizlenir.jpeg\" alt=\"\" class=\"wp-image-3677\" srcset=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-virusu-nasil-temizlenir.jpeg 1000w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-virusu-nasil-temizlenir-300x150.jpeg 300w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-virusu-nasil-temizlenir-768x384.jpeg 768w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-virusu-nasil-temizlenir-360x180.jpeg 360w, https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-virusu-nasil-temizlenir-750x375.jpeg 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n\n\n<p>Trojan&#8217;lar\u0131 kald\u0131r\u0131rken, s\u00f6z konusu Trojan&#8217;\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 arka plan i\u015flemleri \u00e7al\u0131\u015ft\u0131ran normal bir program gibi davranmas\u0131na veya bir ba\u015flang\u0131\u00e7 program\u0131 gibi davranmas\u0131na ba\u011fl\u0131 olarak atman\u0131z gereken farkl\u0131 ad\u0131mlar vard\u0131r.<\/p>\n\n\n\n<p>Normal bir program olarak gizlenmi\u015f bir Truva at\u0131n\u0131 kald\u0131rmak istiyorsan\u0131z a\u015fa\u011f\u0131dakileri uygulaman\u0131z gerekir:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Bilgisayar ayarlar\u0131n\u0131za gidin.<\/li><li>Uygulamalar ve \u00d6zellikler&#8217;e gidin.<\/li><li>Trojan bula\u015fm\u0131\u015f programa t\u0131klay\u0131n.<\/li><li>Kald\u0131r&#8217;a t\u0131klay\u0131n.<\/li><\/ul>\n\n\n\n<p>Ba\u015flang\u0131\u00e7 program\u0131 gibi davranan bir Truva at\u0131n\u0131 kald\u0131r\u0131yorsan\u0131z a\u015fa\u011f\u0131dakileri yap\u0131n:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Windows + R<\/strong> tu\u015flar\u0131na basarak \u00c7al\u0131\u015ft\u0131r men\u00fcs\u00fcn\u00fc a\u00e7\u0131n<\/li><li>&#8220;<code>regedit<\/code>&#8221; yaz\u0131n.<\/li><li><code>HKEY_CURRENT_USER<\/code> ve ard\u0131ndan Yaz\u0131l\u0131m klas\u00f6r\u00fcne t\u0131klay\u0131n.<\/li><li>Truva At\u0131&#8217;n\u0131 bulun.<\/li><li>Sa\u011f t\u0131klay\u0131n ve silin.<\/li><\/ul>\n\n\n\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 arka plan i\u015flemleri \u00e7al\u0131\u015ft\u0131ran bir Truva At\u0131&#8217;n\u0131 kald\u0131rmak i\u00e7in a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 izleyin:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>G\u00f6rev Y\u00f6neticisi&#8217;ni a\u00e7mak i\u00e7in <strong>Ctrl + Alt + Del<\/strong> tu\u015flar\u0131na bas\u0131n<\/li><li>K\u00f6t\u00fc ama\u00e7l\u0131 bir s\u00fcrece sa\u011f t\u0131klay\u0131n.<\/li><li>\u00d6zellikler \u00fczerine t\u0131klay\u0131n.<\/li><li>Ayr\u0131nt\u0131lar sekmesinde program ad\u0131na bak\u0131n.<\/li><li>\u00d6zellikler penceresini kapatt\u0131ktan sonra G\u00f6revi Sonland\u0131r&#8217;a t\u0131klay\u0131n.<\/li><li>\u0130\u015flemi \u00e7al\u0131\u015ft\u0131ran program\u0131 kald\u0131r\u0131n.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Trojanlardan Nas\u0131l Ka\u00e7\u0131nabilirsiniz?<\/h2>\n\n\n\n<p>A\u015fa\u011f\u0131da, truva atlar\u0131ndan ka\u00e7\u0131nmak i\u00e7in atabilece\u011finiz baz\u0131 ad\u0131mlar\u0131n bir listesini bulabilirsiniz:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Bir g\u00fcvenlik duvar\u0131 kullan\u0131n. T\u00fcm b\u00fcy\u00fck i\u015fletim sistemlerinde yerle\u015fik bir gelen g\u00fcvenlik duvar\u0131 ve piyasadaki t\u00fcm ticari y\u00f6nlendiricilerde yerle\u015fik bir NAT g\u00fcvenlik duvar\u0131 vard\u0131r. Bunlar\u0131n etkin oldu\u011fundan emin olun.<\/li><li>Pop-up&#8217;lara asla t\u0131klamay\u0131n.<\/li><li>Taray\u0131c\u0131n\u0131z eri\u015fmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131z bir web sitesi hakk\u0131nda bir uyar\u0131 g\u00f6r\u00fcnt\u00fclerse, dikkat edin ve ihtiyac\u0131n\u0131z olan bilgiyi ba\u015fka bir yerden al\u0131n.<\/li><li>Asla korsan yaz\u0131l\u0131m indirmeyin. \u00dccretsiz \u00fcr\u00fcnler cazip gelse de, bunlar\u0131 y\u00fckleyenlerin genellikle bilgilerinizi di\u011fer internet doland\u0131r\u0131c\u0131lar\u0131na satarak para kazanmak istediklerini unutmay\u0131n.<\/li><li>Yaln\u0131zca yasal sat\u0131c\u0131lardan iyi incelenmi\u015f ve orijinal g\u00fcvenlik yaz\u0131l\u0131mlar\u0131 sat\u0131n al\u0131n.<\/li><li>E-posta eklerini yaln\u0131zca g\u00f6nderene g\u00fcveniyorsan\u0131z ve kimli\u011fini do\u011frulayabilece\u011finizden eminseniz a\u00e7\u0131n. Vir\u00fcsler e-posta\u2019yla gelir ve bu nedenle gelen t\u00fcm postalar\u0131n\u0131z\u0131 bir antivir\u00fcs program\u0131yla taramak her zaman iyi bir fikirdir.<\/li><li>Programlar\u0131n\u0131z\u0131 g\u00fcncel tutun. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar ve vir\u00fcsler genellikle eski yaz\u0131l\u0131mlarda bulunan g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalanmaya \u00e7al\u0131\u015f\u0131r.<\/li><li>Bilgisayar\u0131n\u0131z\u0131n yedeklerini d\u00fczenli \u015fekilde al\u0131n.<\/li><li>\u0130li\u015fkiniz olan resmi bir i\u015fletmeden ya da kurumdan geldi\u011fini iddia eden ve bilgi isteyen bir e-posta al\u0131rsan\u0131z, herhangi bir \u015fey yapmadan \u00f6nce \u00e7ok dikkatli bir \u015fekilde okuyun. Yaz\u0131m ve dilbilgisi hatalar\u0131 var m\u0131? Bir aciliyet havas\u0131 var m\u0131? Bunlar bir oltalama giri\u015fiminin klasik i\u015faretleridir. Unutmay\u0131n, bankan\u0131z ya da bir kamu kurumu sizden asla hassas bilgilerinizi e-posta ile g\u00f6ndermenizi istemez.<\/li><li>URL&#8217;yi kimin g\u00f6nderdi\u011fini ve nereye ba\u011fland\u0131\u011f\u0131n\u0131 tam olarak bilmedi\u011finiz s\u00fcrece e-posta\u2019lardaki ba\u011flant\u0131lara (URL&#8217;ler) t\u0131klamay\u0131n. B\u00f6yle durumlarda bile ba\u011flant\u0131y\u0131 dikkatlice inceleyin.<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><strong>\u0130lgili \u0130\u00e7erikler:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/malware\/\">Malware: Nedir? Nas\u0131l Temizlenir, Nas\u0131l Bula\u015f\u0131r? \u0130\u015fletmeler E-posta G\u00fcvenli\u011fi Hususunda Malware Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunabilir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/botnet\/\">Botnet Nedir? \u0130\u015fletmeler Verilerinin G\u00fcvenli\u011fini Nas\u0131l Sa\u011flamal\u0131? Botnet Sald\u0131r\u0131s\u0131ndan Nas\u0131l Korunmal\u0131d\u0131r?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/firewall-nedir\/\">Firewall Nedir, Ne \u0130\u015fe Yarar? Firewall T\u00fcrleri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/siber-guvenlik-nedir-veri-guvenligini-nasil-saglariz\/\">Siber G\u00fcvenlik Nedir? Veri G\u00fcvenli\u011fini Nas\u0131l Sa\u011flar\u0131z?<\/a>, <a href=\"https:\/\/uzmanposta.com\/blog\/siber-saldiri\/\">Siber Sald\u0131r\u0131 Nedir? \u0130\u015fletmeler E-Posta Verilerini Siber Sald\u0131r\u0131dan Nas\u0131l Korumal\u0131d\u0131r?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/viruslu-e-mail-guvenligi\/\">Vir\u00fcsl\u00fc E-Mailler Hakk\u0131nda Al\u0131nacak \u00d6nlemler ve E-Posta G\u00fcvenli\u011fi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/man-in-the-middle-atagi-mitm\/\">Man-in-the-Middle Ata\u011f\u0131 (MitM) Nedir? Nas\u0131l \u00c7al\u0131\u015f\u0131r? Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/uctan-uca-sifreleme-e2ee\/\">U\u00e7tan Uca \u015eifreleme (E2EE): Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? E-posta \u0130leti\u015fiminde U\u00e7tan Uca \u015eifreleme<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/advanced-persistent-threat-apt\/\">Advanced Persistent Threat (APT) Nedir? Ki\u015filer ve \u0130\u015fletmeler Kendilerini Geli\u015fmi\u015f Kal\u0131c\u0131 Tehdit Sald\u0131r\u0131lar\u0131ndan Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/spoofing\/\">Spoofing Nedir? \u015eirketler \u0130\u00e7in Spoofing Tehditleri: IP Spoofing Sald\u0131r\u0131lar\u0131na Kar\u015f\u0131 Korunma Stratejileri<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/credential-stuffing\/\">Credential Stuffing Nedir? Kimlik Bilgisi Doldurma Sald\u0131r\u0131s\u0131 Nas\u0131l \u00d6nlenir? E-ticaret Sitelerinin Verileri \u0130\u00e7in B\u00fcy\u00fck Tehlike<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/mail-transfer-agent-mta\/\">Mail Transfer Agent (MTA) Nedir? \u0130\u015fletmeler Online Ortamda E-Posta Hesaplar\u0131n\u0131 Nas\u0131l Korumal\u0131?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/dlp-data-loss-prevention\/\">DLP (Data Loss Prevention) Nedir? Kurumlar \u0130\u00e7in \u0130nternet Ortam\u0131nda Tehditleri \u0130zleme ve Verileri G\u00fcvende Tutma Rehberi<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/phishing-nedir\/\">Phishing (Oltalama) Nedir? Phishing Sald\u0131r\u0131s\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/ransomware\/\">Ransomware Nedir, Nas\u0131l \u00c7al\u0131\u015f\u0131r? Ransomware Vir\u00fcs\u00fcn\u00fcn Mail Yoluyla Bula\u015fmas\u0131n\u0131 Engelleme&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/sosyal-muhendislik\/\">Sosyal M\u00fchendislik Nedir? Sosyal M\u00fchendislik Sald\u0131r\u0131lar\u0131 Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/bec\/\">Business Email Compromise (BEC) Nedir? BEC Sald\u0131r\u0131lar\u0131 Nas\u0131l Engellenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/kimlik-avi-nedir-nasil-onlenir\/\">Kimlik Av\u0131 Nedir, Nas\u0131l \u00d6nlenir?<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/vpn-nedir\/\">VPN Nedir, Nas\u0131l Kullan\u0131l\u0131r? VPN Hakk\u0131nda Bilmen Gereken Her \u015eey<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/uzmanposta.com\/blog\/brute-force\/\">Brute Force Nedir? T\u00fcrleri, Nedenleri, Y\u00f6ntemleri, Hangi G\u00fcvenlik \u00d6nlemleri Al\u0131nabilir?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trojan vir\u00fcsleri en yayg\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcrleri aras\u0131ndad\u0131r. Ki\u015fisel bilgilerinizi \u00e7almak, dosyalar\u0131n\u0131z\u0131 silmek ve bilgisayar\u0131n\u0131z\u0131 ele ge\u00e7irmek i\u00e7in tasarlanm\u0131\u015flard\u0131r. Ayr\u0131ca bir trojan vir\u00fcs\u00fc, bir bilgisayar korsan\u0131n\u0131n makinenize uzaktan eri\u015fmesini sa\u011flayarak sizi g\u00f6zetlemesini ve hatta kimli\u011finizi \u00e7almas\u0131n\u0131 da m\u00fcmk\u00fcn k\u0131labilir.&nbsp; E\u011fer cihaz\u0131n\u0131zda trojan vir\u00fcs\u00fcn\u00fcz oldu\u011funu d\u00fc\u015f\u00fcn\u00fcyor, ancak bu vir\u00fcs\u00fc kendi ba\u015f\u0131n\u0131za nas\u0131l kald\u0131raca\u011f\u0131n\u0131z\u0131 bilmiyorsan\u0131z, bu [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3673,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[86],"tags":[],"class_list":["post-3654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri - Uzman Posta<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzmanposta.com\/blog\/trojan\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri - Uzman Posta\" \/>\n<meta property=\"og:description\" content=\"Trojan vir\u00fcsleri en yayg\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcrleri aras\u0131ndad\u0131r. Ki\u015fisel bilgilerinizi \u00e7almak, dosyalar\u0131n\u0131z\u0131 silmek ve bilgisayar\u0131n\u0131z\u0131 ele ge\u00e7irmek i\u00e7in tasarlanm\u0131\u015flard\u0131r. Ayr\u0131ca bir trojan vir\u00fcs\u00fc, bir bilgisayar korsan\u0131n\u0131n makinenize uzaktan eri\u015fmesini sa\u011flayarak sizi g\u00f6zetlemesini ve hatta kimli\u011finizi \u00e7almas\u0131n\u0131 da m\u00fcmk\u00fcn k\u0131labilir.&nbsp; E\u011fer cihaz\u0131n\u0131zda trojan vir\u00fcs\u00fcn\u00fcz oldu\u011funu d\u00fc\u015f\u00fcn\u00fcyor, ancak bu vir\u00fcs\u00fc kendi ba\u015f\u0131n\u0131za nas\u0131l kald\u0131raca\u011f\u0131n\u0131z\u0131 bilmiyorsan\u0131z, bu [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzmanposta.com\/blog\/trojan\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzmanposta\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-26T12:19:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-26T12:24:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-nedir-nasil-bulasir-mail-yoluyla-bulasir-mi-guvenlik-onlemleri.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sibel Ho\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:site\" content=\"@uZmanPosta\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sibel Ho\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 dakika\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri - Uzman Posta","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzmanposta.com\/blog\/trojan\/","og_locale":"tr_TR","og_type":"article","og_title":"Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri - Uzman Posta","og_description":"Trojan vir\u00fcsleri en yayg\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m t\u00fcrleri aras\u0131ndad\u0131r. Ki\u015fisel bilgilerinizi \u00e7almak, dosyalar\u0131n\u0131z\u0131 silmek ve bilgisayar\u0131n\u0131z\u0131 ele ge\u00e7irmek i\u00e7in tasarlanm\u0131\u015flard\u0131r. Ayr\u0131ca bir trojan vir\u00fcs\u00fc, bir bilgisayar korsan\u0131n\u0131n makinenize uzaktan eri\u015fmesini sa\u011flayarak sizi g\u00f6zetlemesini ve hatta kimli\u011finizi \u00e7almas\u0131n\u0131 da m\u00fcmk\u00fcn k\u0131labilir.&nbsp; E\u011fer cihaz\u0131n\u0131zda trojan vir\u00fcs\u00fcn\u00fcz oldu\u011funu d\u00fc\u015f\u00fcn\u00fcyor, ancak bu vir\u00fcs\u00fc kendi ba\u015f\u0131n\u0131za nas\u0131l kald\u0131raca\u011f\u0131n\u0131z\u0131 bilmiyorsan\u0131z, bu [&hellip;]","og_url":"https:\/\/uzmanposta.com\/blog\/trojan\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/uzmanposta\/","article_published_time":"2023-09-26T12:19:51+00:00","article_modified_time":"2023-09-26T12:24:17+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-nedir-nasil-bulasir-mail-yoluyla-bulasir-mi-guvenlik-onlemleri.jpeg","type":"image\/jpeg"}],"author":"Sibel Ho\u015f","twitter_card":"summary_large_image","twitter_creator":"@uZmanPosta","twitter_site":"@uZmanPosta","twitter_misc":{"Yazan:":"Sibel Ho\u015f","Tahmini okuma s\u00fcresi":"14 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzmanposta.com\/blog\/trojan\/#article","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/trojan\/"},"author":{"name":"Sibel Ho\u015f","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6"},"headline":"Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri","datePublished":"2023-09-26T12:19:51+00:00","dateModified":"2023-09-26T12:24:17+00:00","mainEntityOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/trojan\/"},"wordCount":3149,"publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-nedir-nasil-bulasir-mail-yoluyla-bulasir-mi-guvenlik-onlemleri.jpeg","articleSection":["G\u00fcvenlik"],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/uzmanposta.com\/blog\/trojan\/","url":"https:\/\/uzmanposta.com\/blog\/trojan\/","name":"Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri - Uzman Posta","isPartOf":{"@id":"https:\/\/uzmanposta.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzmanposta.com\/blog\/trojan\/#primaryimage"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-nedir-nasil-bulasir-mail-yoluyla-bulasir-mi-guvenlik-onlemleri.jpeg","datePublished":"2023-09-26T12:19:51+00:00","dateModified":"2023-09-26T12:24:17+00:00","breadcrumb":{"@id":"https:\/\/uzmanposta.com\/blog\/trojan\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzmanposta.com\/blog\/trojan\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/trojan\/#primaryimage","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-nedir-nasil-bulasir-mail-yoluyla-bulasir-mi-guvenlik-onlemleri.jpeg","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/09\/trojan-nedir-nasil-bulasir-mail-yoluyla-bulasir-mi-guvenlik-onlemleri.jpeg","width":1000,"height":500,"caption":"Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri"},{"@type":"BreadcrumbList","@id":"https:\/\/uzmanposta.com\/blog\/trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/uzmanposta.com\/blog\/"},{"@type":"ListItem","position":2,"name":"G\u00fcvenlik","item":"https:\/\/uzmanposta.com\/blog\/guvenlik\/"},{"@type":"ListItem","position":3,"name":"Trojan Nedir, Nas\u0131l Bula\u015f\u0131r? Mail Yoluyla Bula\u015f\u0131r m\u0131? G\u00fcvenlik \u00d6nlemleri"}]},{"@type":"WebSite","@id":"https:\/\/uzmanposta.com\/blog\/#website","url":"https:\/\/uzmanposta.com\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/uzmanposta.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzmanposta.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/uzmanposta.com\/blog\/#organization","name":"Uzman Posta","url":"https:\/\/uzmanposta.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","contentUrl":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2020\/05\/logo.png","width":131,"height":60,"caption":"Uzman Posta"},"image":{"@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/uzmanposta\/","https:\/\/x.com\/uZmanPosta","https:\/\/www.instagram.com\/uzmanposta\/","https:\/\/www.linkedin.com\/company\/uzmanposta\/","https:\/\/www.youtube.com\/channel\/UCk2n1vp1YJ0n3XaDRWBi88Q"]},{"@type":"Person","@id":"https:\/\/uzmanposta.com\/blog\/#\/schema\/person\/ac85212a35ebcaaf56c92a7e051813d6","name":"Sibel Ho\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f925f03d20ff0803ddb37c96d39d3793c085014ce56421050f24823c23db1c2a?s=96&d=mm&r=g","caption":"Sibel Ho\u015f"},"sameAs":["https:\/\/sibelhos.com\/","https:\/\/www.instagram.com\/bismoothie\/","https:\/\/www.linkedin.com\/in\/sibelhos\/"]}]}},"_links":{"self":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/comments?post=3654"}],"version-history":[{"count":0,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/posts\/3654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media\/3673"}],"wp:attachment":[{"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/media?parent=3654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/categories?post=3654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzmanposta.com\/blog\/wp-json\/wp\/v2\/tags?post=3654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}